Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core
Classifying Web Exploits with Topic Modeling
This short empirical paper investigates how well topic modeling and database meta-data characteristics can classify web and other proof-of-concept (PoC) exploits for publicly disclosed software vulnerabilities.
Ruohonen, Jukka
core +1 more source
Magnetic Textiles: A Review of Materials, Fabrication, Properties, and Applications
Magnetic textiles (M‐textiles) are emerging as a programmable materials platform that merges magnetic matter with hierarchical textile structures. This article consolidates magnetic material classes, textile architectures, and fabrication and magnetization strategies, revealing structure–property–function relationships that govern magneto‐mechanical ...
Li Ke +3 more
wiley +1 more source
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu +3 more
doaj +1 more source
Analyzing Android Browser Apps for file:// Vulnerabilities
Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser ...
Chang, Rocky K. C., Wu, Daoyuan
core +1 more source
This review identifies key design considerations for insect‐inspired microrobots capable of multimodal locomotion. To draw inspiration, biological and robotic strategies for moving in air, on water surfaces, and underwater are examined, along with approaches for crossing the air–water interface.
Mija Jovchevska +2 more
wiley +1 more source
From Lab to Landscape: Environmental Biohybrid Robotics for Ecological Futures
This Perspective explores environmental biohybrid robotics, integrating living tissues, microorganisms, and insects for operation in real‐world ecosystems. It traces the leap from laboratory experiments to forests, wetlands, and urban environments and discusses key challenges, development pathways, and opportunities for ecological monitoring and ...
Miriam Filippi
wiley +1 more source
General Aspects of some Causes of Web Application Vulnerabilities [PDF]
Because web applications are complex software systems in constant evolution, they become real targets for hackers as they provide direct access to corporate or personal data.
Mironela Pîrnău
doaj
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source
Fluorescent BODIPY‐conjugated thiosemicarbazone ligands and their Ga(III), In(III), and Fe(III) complexes, inspired by Triapine, are developed as theranostic agents. Multiphoton FLIM and confocal microscopy in cancer cells and zebrafish reveal real‐time uptake, mitochondrial localisation, and whilst spectroscopic assays indicated preserved complex ...
Megan J. Green +15 more
wiley +1 more source

